Hay
Date
July 19, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   14.943666] ==================================================================
[   14.944263] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   14.946302] Write of size 1 at addr fff00000c6417473 by task kunit_try_catch/136
[   14.946627] 
[   14.948880] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT 
[   14.949133] Tainted: [N]=TEST
[   14.949169] Hardware name: linux,dummy-virt (DT)
[   14.949960] Call trace:
[   14.950382]  show_stack+0x20/0x38 (C)
[   14.950579]  dump_stack_lvl+0x8c/0xd0
[   14.950654]  print_report+0x118/0x5d0
[   14.950729]  kasan_report+0xdc/0x128
[   14.950775]  __asan_report_store1_noabort+0x20/0x30
[   14.950828]  kmalloc_oob_right+0x5a4/0x660
[   14.950874]  kunit_try_run_case+0x170/0x3f0
[   14.950925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.950976]  kthread+0x328/0x630
[   14.951030]  ret_from_fork+0x10/0x20
[   14.951231] 
[   14.951300] Allocated by task 136:
[   14.951447]  kasan_save_stack+0x3c/0x68
[   14.951543]  kasan_save_track+0x20/0x40
[   14.951589]  kasan_save_alloc_info+0x40/0x58
[   14.951627]  __kasan_kmalloc+0xd4/0xd8
[   14.951671]  __kmalloc_cache_noprof+0x16c/0x3c0
[   14.952251]  kmalloc_oob_right+0xb0/0x660
[   14.952405]  kunit_try_run_case+0x170/0x3f0
[   14.952448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.952511]  kthread+0x328/0x630
[   14.952543]  ret_from_fork+0x10/0x20
[   14.952610] 
[   14.952676] The buggy address belongs to the object at fff00000c6417400
[   14.952676]  which belongs to the cache kmalloc-128 of size 128
[   14.953082] The buggy address is located 0 bytes to the right of
[   14.953082]  allocated 115-byte region [fff00000c6417400, fff00000c6417473)
[   14.953200] 
[   14.953317] The buggy address belongs to the physical page:
[   14.953864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417
[   14.954703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   14.955458] page_type: f5(slab)
[   14.956305] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   14.956430] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.956573] page dumped because: kasan: bad access detected
[   14.956616] 
[   14.956642] Memory state around the buggy address:
[   14.957163]  fff00000c6417300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.957347]  fff00000c6417380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957499] >fff00000c6417400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.957555]                                                              ^
[   14.957851]  fff00000c6417480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.957902]  fff00000c6417500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.958087] ==================================================================
[   14.966947] ==================================================================
[   14.967001] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   14.967050] Read of size 1 at addr fff00000c6417480 by task kunit_try_catch/136
[   14.967097] 
[   14.967128] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   14.967206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.967260] Hardware name: linux,dummy-virt (DT)
[   14.967291] Call trace:
[   14.967318]  show_stack+0x20/0x38 (C)
[   14.967367]  dump_stack_lvl+0x8c/0xd0
[   14.967412]  print_report+0x118/0x5d0
[   14.967457]  kasan_report+0xdc/0x128
[   14.967502]  __asan_report_load1_noabort+0x20/0x30
[   14.967561]  kmalloc_oob_right+0x5d0/0x660
[   14.967607]  kunit_try_run_case+0x170/0x3f0
[   14.967654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.967716]  kthread+0x328/0x630
[   14.967757]  ret_from_fork+0x10/0x20
[   14.967826] 
[   14.967866] Allocated by task 136:
[   14.968132]  kasan_save_stack+0x3c/0x68
[   14.968197]  kasan_save_track+0x20/0x40
[   14.968310]  kasan_save_alloc_info+0x40/0x58
[   14.968434]  __kasan_kmalloc+0xd4/0xd8
[   14.968497]  __kmalloc_cache_noprof+0x16c/0x3c0
[   14.968652]  kmalloc_oob_right+0xb0/0x660
[   14.968776]  kunit_try_run_case+0x170/0x3f0
[   14.968903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.969041]  kthread+0x328/0x630
[   14.969166]  ret_from_fork+0x10/0x20
[   14.969255] 
[   14.969459] The buggy address belongs to the object at fff00000c6417400
[   14.969459]  which belongs to the cache kmalloc-128 of size 128
[   14.969619] The buggy address is located 13 bytes to the right of
[   14.969619]  allocated 115-byte region [fff00000c6417400, fff00000c6417473)
[   14.969682] 
[   14.969713] The buggy address belongs to the physical page:
[   14.969741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417
[   14.969917] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   14.970053] page_type: f5(slab)
[   14.970129] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   14.970223] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.970319] page dumped because: kasan: bad access detected
[   14.970413] 
[   14.970443] Memory state around the buggy address:
[   14.970524]  fff00000c6417380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.970632]  fff00000c6417400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.970678] >fff00000c6417480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.970783]                    ^
[   14.971111]  fff00000c6417500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.971210]  fff00000c6417580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.971294] ==================================================================
[   14.959475] ==================================================================
[   14.959517] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   14.959755] Write of size 1 at addr fff00000c6417478 by task kunit_try_catch/136
[   14.960184] 
[   14.960267] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   14.960389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.960461] Hardware name: linux,dummy-virt (DT)
[   14.960493] Call trace:
[   14.960514]  show_stack+0x20/0x38 (C)
[   14.960564]  dump_stack_lvl+0x8c/0xd0
[   14.960609]  print_report+0x118/0x5d0
[   14.960655]  kasan_report+0xdc/0x128
[   14.960711]  __asan_report_store1_noabort+0x20/0x30
[   14.960762]  kmalloc_oob_right+0x538/0x660
[   14.960807]  kunit_try_run_case+0x170/0x3f0
[   14.960855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.960908]  kthread+0x328/0x630
[   14.960949]  ret_from_fork+0x10/0x20
[   14.961267] 
[   14.961357] Allocated by task 136:
[   14.961444]  kasan_save_stack+0x3c/0x68
[   14.961532]  kasan_save_track+0x20/0x40
[   14.961644]  kasan_save_alloc_info+0x40/0x58
[   14.961730]  __kasan_kmalloc+0xd4/0xd8
[   14.961765]  __kmalloc_cache_noprof+0x16c/0x3c0
[   14.961831]  kmalloc_oob_right+0xb0/0x660
[   14.961865]  kunit_try_run_case+0x170/0x3f0
[   14.961901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   14.962182]  kthread+0x328/0x630
[   14.962247]  ret_from_fork+0x10/0x20
[   14.962339] 
[   14.962418] The buggy address belongs to the object at fff00000c6417400
[   14.962418]  which belongs to the cache kmalloc-128 of size 128
[   14.962547] The buggy address is located 5 bytes to the right of
[   14.962547]  allocated 115-byte region [fff00000c6417400, fff00000c6417473)
[   14.962628] 
[   14.962647] The buggy address belongs to the physical page:
[   14.962675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106417
[   14.962885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   14.962999] page_type: f5(slab)
[   14.963066] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   14.963124] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.963199] page dumped because: kasan: bad access detected
[   14.963265] 
[   14.963283] Memory state around the buggy address:
[   14.963322]  fff00000c6417300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.963618]  fff00000c6417380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.963695] >fff00000c6417400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   14.963801]                                                                 ^
[   14.964027]  fff00000c6417480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964077]  fff00000c6417500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964114] ==================================================================

[   11.319079] ==================================================================
[   11.319655] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   11.319895] Read of size 1 at addr ffff888102fc3f80 by task kunit_try_catch/153
[   11.320755] 
[   11.321122] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.321173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.321185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.321206] Call Trace:
[   11.321219]  <TASK>
[   11.321232]  dump_stack_lvl+0x73/0xb0
[   11.321269]  print_report+0xd1/0x610
[   11.321290]  ? __virt_addr_valid+0x1db/0x2d0
[   11.321311]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.321331]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.321357]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.321377]  kasan_report+0x141/0x180
[   11.321397]  ? kmalloc_oob_right+0x68a/0x7f0
[   11.321422]  __asan_report_load1_noabort+0x18/0x20
[   11.321444]  kmalloc_oob_right+0x68a/0x7f0
[   11.321464]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.321485]  ? __schedule+0x10cc/0x2b60
[   11.321506]  ? __pfx_read_tsc+0x10/0x10
[   11.321525]  ? ktime_get_ts64+0x86/0x230
[   11.321548]  kunit_try_run_case+0x1a5/0x480
[   11.321570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.321591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.321612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.321634]  ? __kthread_parkme+0x82/0x180
[   11.321653]  ? preempt_count_sub+0x50/0x80
[   11.321675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.321698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.321719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.321741]  kthread+0x337/0x6f0
[   11.321759]  ? trace_preempt_on+0x20/0xc0
[   11.321780]  ? __pfx_kthread+0x10/0x10
[   11.321799]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.321819]  ? calculate_sigpending+0x7b/0xa0
[   11.321842]  ? __pfx_kthread+0x10/0x10
[   11.321863]  ret_from_fork+0x116/0x1d0
[   11.321879]  ? __pfx_kthread+0x10/0x10
[   11.321898]  ret_from_fork_asm+0x1a/0x30
[   11.321927]  </TASK>
[   11.321936] 
[   11.330058] Allocated by task 153:
[   11.330248]  kasan_save_stack+0x45/0x70
[   11.330632]  kasan_save_track+0x18/0x40
[   11.330833]  kasan_save_alloc_info+0x3b/0x50
[   11.331171]  __kasan_kmalloc+0xb7/0xc0
[   11.331328]  __kmalloc_cache_noprof+0x189/0x420
[   11.331612]  kmalloc_oob_right+0xa9/0x7f0
[   11.331833]  kunit_try_run_case+0x1a5/0x480
[   11.332050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.332293]  kthread+0x337/0x6f0
[   11.332406]  ret_from_fork+0x116/0x1d0
[   11.332530]  ret_from_fork_asm+0x1a/0x30
[   11.332660] 
[   11.332775] The buggy address belongs to the object at ffff888102fc3f00
[   11.332775]  which belongs to the cache kmalloc-128 of size 128
[   11.333508] The buggy address is located 13 bytes to the right of
[   11.333508]  allocated 115-byte region [ffff888102fc3f00, ffff888102fc3f73)
[   11.334141] 
[   11.334261] The buggy address belongs to the physical page:
[   11.334641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fc3
[   11.335026] flags: 0x200000000000000(node=0|zone=2)
[   11.335259] page_type: f5(slab)
[   11.335519] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.335857] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.336205] page dumped because: kasan: bad access detected
[   11.336467] 
[   11.336589] Memory state around the buggy address:
[   11.336914]  ffff888102fc3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.337242]  ffff888102fc3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.337550] >ffff888102fc3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.338109]                    ^
[   11.338265]  ffff888102fc4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.338476]  ffff888102fc4080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   11.338788] ==================================================================
[   11.260775] ==================================================================
[   11.261477] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   11.262203] Write of size 1 at addr ffff888102fc3f73 by task kunit_try_catch/153
[   11.262872] 
[   11.264075] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.264487] Tainted: [N]=TEST
[   11.264522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.264735] Call Trace:
[   11.264798]  <TASK>
[   11.264937]  dump_stack_lvl+0x73/0xb0
[   11.265040]  print_report+0xd1/0x610
[   11.265068]  ? __virt_addr_valid+0x1db/0x2d0
[   11.265093]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.265113]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.265134]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.265154]  kasan_report+0x141/0x180
[   11.265175]  ? kmalloc_oob_right+0x6f0/0x7f0
[   11.265200]  __asan_report_store1_noabort+0x1b/0x30
[   11.265224]  kmalloc_oob_right+0x6f0/0x7f0
[   11.265245]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.265266]  ? __schedule+0x10cc/0x2b60
[   11.265289]  ? __pfx_read_tsc+0x10/0x10
[   11.265310]  ? ktime_get_ts64+0x86/0x230
[   11.265335]  kunit_try_run_case+0x1a5/0x480
[   11.265361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.265382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.265405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.265447]  ? __kthread_parkme+0x82/0x180
[   11.265468]  ? preempt_count_sub+0x50/0x80
[   11.265491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.265514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.265536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.265558]  kthread+0x337/0x6f0
[   11.265576]  ? trace_preempt_on+0x20/0xc0
[   11.265599]  ? __pfx_kthread+0x10/0x10
[   11.265618]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.265638]  ? calculate_sigpending+0x7b/0xa0
[   11.265664]  ? __pfx_kthread+0x10/0x10
[   11.265684]  ret_from_fork+0x116/0x1d0
[   11.265702]  ? __pfx_kthread+0x10/0x10
[   11.265721]  ret_from_fork_asm+0x1a/0x30
[   11.265780]  </TASK>
[   11.265844] 
[   11.277081] Allocated by task 153:
[   11.277538]  kasan_save_stack+0x45/0x70
[   11.277905]  kasan_save_track+0x18/0x40
[   11.278079]  kasan_save_alloc_info+0x3b/0x50
[   11.278545]  __kasan_kmalloc+0xb7/0xc0
[   11.278817]  __kmalloc_cache_noprof+0x189/0x420
[   11.279029]  kmalloc_oob_right+0xa9/0x7f0
[   11.279226]  kunit_try_run_case+0x1a5/0x480
[   11.279751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.279972]  kthread+0x337/0x6f0
[   11.280345]  ret_from_fork+0x116/0x1d0
[   11.280754]  ret_from_fork_asm+0x1a/0x30
[   11.281254] 
[   11.281668] The buggy address belongs to the object at ffff888102fc3f00
[   11.281668]  which belongs to the cache kmalloc-128 of size 128
[   11.282711] The buggy address is located 0 bytes to the right of
[   11.282711]  allocated 115-byte region [ffff888102fc3f00, ffff888102fc3f73)
[   11.283686] 
[   11.284088] The buggy address belongs to the physical page:
[   11.284981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fc3
[   11.285899] flags: 0x200000000000000(node=0|zone=2)
[   11.286592] page_type: f5(slab)
[   11.287104] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.287416] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.288155] page dumped because: kasan: bad access detected
[   11.288630] 
[   11.288739] Memory state around the buggy address:
[   11.289580]  ffff888102fc3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.289905]  ffff888102fc3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.290264] >ffff888102fc3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.290894]                                                              ^
[   11.291389]  ffff888102fc3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.291880]  ffff888102fc4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.292329] ==================================================================
[   11.294303] ==================================================================
[   11.294732] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   11.295117] Write of size 1 at addr ffff888102fc3f78 by task kunit_try_catch/153
[   11.295834] 
[   11.296138] CPU: 0 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   11.296257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.296270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.296289] Call Trace:
[   11.296300]  <TASK>
[   11.296314]  dump_stack_lvl+0x73/0xb0
[   11.296340]  print_report+0xd1/0x610
[   11.296361]  ? __virt_addr_valid+0x1db/0x2d0
[   11.296403]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.296423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.296461]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.296481]  kasan_report+0x141/0x180
[   11.296501]  ? kmalloc_oob_right+0x6bd/0x7f0
[   11.296525]  __asan_report_store1_noabort+0x1b/0x30
[   11.296548]  kmalloc_oob_right+0x6bd/0x7f0
[   11.296568]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.296589]  ? __schedule+0x10cc/0x2b60
[   11.296610]  ? __pfx_read_tsc+0x10/0x10
[   11.296629]  ? ktime_get_ts64+0x86/0x230
[   11.296652]  kunit_try_run_case+0x1a5/0x480
[   11.296674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.296695]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   11.296716]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.296737]  ? __kthread_parkme+0x82/0x180
[   11.296756]  ? preempt_count_sub+0x50/0x80
[   11.296777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.296799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.296821]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.296843]  kthread+0x337/0x6f0
[   11.296861]  ? trace_preempt_on+0x20/0xc0
[   11.296882]  ? __pfx_kthread+0x10/0x10
[   11.296901]  ? _raw_spin_unlock_irq+0x47/0x80
[   11.296921]  ? calculate_sigpending+0x7b/0xa0
[   11.296945]  ? __pfx_kthread+0x10/0x10
[   11.296965]  ret_from_fork+0x116/0x1d0
[   11.296989]  ? __pfx_kthread+0x10/0x10
[   11.297019]  ret_from_fork_asm+0x1a/0x30
[   11.297048]  </TASK>
[   11.297057] 
[   11.307253] Allocated by task 153:
[   11.307666]  kasan_save_stack+0x45/0x70
[   11.308025]  kasan_save_track+0x18/0x40
[   11.308317]  kasan_save_alloc_info+0x3b/0x50
[   11.308620]  __kasan_kmalloc+0xb7/0xc0
[   11.308765]  __kmalloc_cache_noprof+0x189/0x420
[   11.309224]  kmalloc_oob_right+0xa9/0x7f0
[   11.309390]  kunit_try_run_case+0x1a5/0x480
[   11.309671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.310128]  kthread+0x337/0x6f0
[   11.310255]  ret_from_fork+0x116/0x1d0
[   11.310633]  ret_from_fork_asm+0x1a/0x30
[   11.310797] 
[   11.310953] The buggy address belongs to the object at ffff888102fc3f00
[   11.310953]  which belongs to the cache kmalloc-128 of size 128
[   11.311772] The buggy address is located 5 bytes to the right of
[   11.311772]  allocated 115-byte region [ffff888102fc3f00, ffff888102fc3f73)
[   11.312298] 
[   11.312588] The buggy address belongs to the physical page:
[   11.312992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fc3
[   11.313448] flags: 0x200000000000000(node=0|zone=2)
[   11.313898] page_type: f5(slab)
[   11.314059] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.314617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   11.314983] page dumped because: kasan: bad access detected
[   11.315462] 
[   11.315567] Memory state around the buggy address:
[   11.315894]  ffff888102fc3e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.316176]  ffff888102fc3e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.316670] >ffff888102fc3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.317095]                                                                 ^
[   11.317543]  ffff888102fc3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.318084]  ffff888102fc4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.318547] ==================================================================